iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11042-019-7333-x
Rich QR code with three-layer information using visual secret sharing scheme | Multimedia Tools and Applications Skip to main content
Log in

Rich QR code with three-layer information using visual secret sharing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a QR code; therefore, in formation security becomes a major challenge to QR codes for private use. Moreover, human vision is hard to distinguish a QR code from others because its appearance looks randomly. In this paper, we propose a visual secret sharing scheme to achieve a rich QR code with three-layer information storage. In the three layers, the first one and the second one are respectively recognizable by human vision and QR code readers, while the third layer is designed for storing private data. Additionally, we also highlight the low computational complexity of secret extraction from the rich QR code.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Biswas R, Sil J (2012) An improved canny edge detection algorithm based on type-2 fuzzy sets. Procedia Technology 4(11):820–824

    Article  Google Scholar 

  2. Chen C (2016) QR code authentication with embedded message authentication code. Mobile Networks and Applications 22:383–394

    Article  Google Scholar 

  3. Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimed Tools Appl:1–21

  4. Chuang JC, Hu YC, Ko HJ (2010) A novel secret sharing technique using qr code. International Journal of Image Processing 4(5):468–475

    Google Scholar 

  5. Huang CT, Zhang YH, Lin LC, Wang WJ, Wang SJ (2016) Mutual authentications to parties with qr-code applications in mobile systems. Int J Inf Secur:1–16

  6. ISO/IEC 18004 (2000) Information technology automatic identification and data capture techniques. Bar code Symbology-QR code

  7. Jiang D, Xu Z, Chen Z et al (2011) Joint time-frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547

    Article  Google Scholar 

  8. Jiang D, Xu Z, Zhang P et al (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40(2):292–306

    Article  Google Scholar 

  9. Jiang D, Xu Z, Li W et al (2015) Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks. J Syst Softw 104:152–165

    Article  Google Scholar 

  10. Jiang D, Yao C, Xu Z et al (2015) Multi-scale anomaly detection for high-speed network traffic. Transactions on Emerging Telecommunications Technologies 26:308–317

    Article  Google Scholar 

  11. Jiang D, Zhang P, Lv Z et al (2016) Energy-efficient multi-constraint routing algorithm with load balancing for Smart City applications. IEEE Internet Things J 3(6):1437–1447

    Article  Google Scholar 

  12. Jiang D, Yuan Z, Zhang P et al (2016) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tools Appl 75(22):14281–14305

    Article  Google Scholar 

  13. Jiang D, Huo L, Lv Z et al (2018) A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans Intell Transp Syst pp(99):1–15

    Google Scholar 

  14. Jiang D, Huo L, Li Y (2018) Fine granularity inference and estimations to network traffic for SDN. PLoS One 13(5):e0194302

    Article  Google Scholar 

  15. Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381–398

    Article  Google Scholar 

  16. Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Transactions on Industrial Informatics 12:384–392

    Google Scholar 

  17. Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP Journal on Image and Video Processing 1:14

    Article  Google Scholar 

  18. Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptography and QR code. Application Research of Computers 33:3460–3463

    Google Scholar 

  19. Naor M, Shamir A (1995) Visual cryptography. EUROCRYPT 1994: advances in cryptology — EUROCRYPT’94 950:1–12

  20. Patvardhan C, Kumar P, Lakshmi CV (2017) Effective color image watermarking scheme using YCbCr color space and QR code. Multimed Tools Appl 77:12655–12677

    Article  Google Scholar 

  21. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Transactions on Information Forensics and Security 11:571–583

    Article  Google Scholar 

  22. Tuyls P, Hollmann HD, Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186

    Article  MathSciNet  MATH  Google Scholar 

  23. Ulichney RA (1993) Void-and-cluster method for dither array generation. IS&T/SPIE symposium on electronic imaging science and technology. In: Proc. Conf. Human vision, visual processing and digital display IV SPIE, vol 1913, pp 332–343

  24. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 9:1–16

    Google Scholar 

  25. Wang Z, Arce GR, Crescenzo GD (2009) Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics & Security 4(3):383–396

    Article  MATH  Google Scholar 

  26. Wang J, Song L, Liang X, Liu Y, Liu P (2016) Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code. Opt Quant Electron 48:523

    Article  Google Scholar 

  27. Wang G, Liu F, Yan WQ (2016) 2D barcodes for visual cryptography. Multimed Tools Appl 75(2):1223–1241

    Article  Google Scholar 

  28. Yang CN, Sun LZ, Cai SR (2016) Extended color visual cryptography for black and white secret image. Theor Comput Sci 609(P1):143–161

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (grant 61602513) and the Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute (grant 2016611303).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuqiao Cheng.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fu, Z., Cheng, Y. & Yu, B. Rich QR code with three-layer information using visual secret sharing scheme. Multimed Tools Appl 78, 19861–19875 (2019). https://doi.org/10.1007/s11042-019-7333-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7333-x

Keywords

Navigation